Learn More
Wireless mesh networks (WMNs) are low-cost access networks built on cooperative routing over a backbone composed of stationary wireless routers. WMNs must deal with the highly unstable wireless medium. Thus, routing metrics and protocols are evolving by designing algorithms that consider link quality to choose the best routes. In this work, we analyze the(More)
—In this paper, we propose to use OpenFlow as a platform for creating a virtual network environment. We analyze the advantages and disadvantages of using OpenFlow and develop a prototype to manage virtual networks. Our prototype allows network visualization, network monitoring, and flow control. Our analysis shows that the developed prototype can be used as(More)
Currently, there is a strong effort of the research community in rethinking the Internet architecture to cope with its current limitations and support new requirements. Many researchers conclude that there is no one-size-fits-all solution for all of the user and network-provider needs and, thus, advocate for a pluralist network architecture , which allows(More)
The upcoming terrestrial digital television technology brings a new class of services to traditional TV sets. A set-top box may, for example , access the Internet and send e-mail. The interactive return channel makes these new services possible. This channel allows TV viewers to interact by sending data back to the TV broadcaster. In this article, we(More)
The current Internet architecture allows malicious nodes to disguise their origin during denial-of-service attacks with IP spoofing. A well-known solution to identify these nodes is IP traceback. In this paper, we introduce and analyze a lightweight single-packet IP trace-back system that does not store any data in the network core. The proposed system(More)
— This paper presents the design of a plug-in for the Optimized Link State Routing (OLSR) protocol with the Expected Transmission Time (ETT) metric and experiments in an indoor testbed. The ETT metric is implemented as a plug-in, keeping portability and facilitating its deployment on operational networks. Our design identifies important implementation(More)
— On most denial-of-service (DoS) attacks, packets with spoofed source addresses are employed in order to disguise the true origin of the attacker. A defense strategy is to trace attack packets back to their actual source in order to make the attacker accountable and isolate him from the network. To date, the proposed traceback systems require either large(More)
A wireless ad hoc network is a collection of wireless nodes that can dynamically self-organize into an arbitrary and temporary topology to form a network without necessarily using any pre-existing infrastructure. These characteristics make ad hoc networks well suited for military activities, emergency operations, and disaster recoveries. Nevertheless, as(More)
— In this paper, we propose a new admission control mechanism for providing QoS in optical burst-switching networks (OBS). The proposed mechanism admits bursts of a given service class according to network load and a class-associated parameter. Based on this parameter, referred as load level, it is possible to differentiate the burst blocking probability(More)